R
Rui Zhang
Researcher at Chinese Academy of Sciences
Publications - 29
Citations - 567
Rui Zhang is an academic researcher from Chinese Academy of Sciences. The author has contributed to research in topics: Encryption & Attribute-based encryption. The author has an hindex of 11, co-authored 28 publications receiving 376 citations.
Papers
More filters
Journal ArticleDOI
Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
TL;DR: This paper proposes a more efficient and generic construction of ABE with verifiable outsourced decryption based on an attribute-based key encapsulation mechanism, a symmetric-key encryption scheme and a commitment scheme and proves the security and the verification soundness of the constructed ABE scheme in the standard model.
Journal ArticleDOI
Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
TL;DR: Two ciphertext-policy attribute-based key encapsulation mechanism (CP-AB-KEM) schemes that for the first time achieve both outsourced encryption and outsourced decryption in two system storage models and give corresponding security analysis.
Book ChapterDOI
Generic construction of chosen ciphertext secure proxy re-encryption
Goichiro Hanaoka,Yutaka Kawai,Noboru Kunihiro,Takahiro Matsuda,Jian Weng,Rui Zhang,Yunlei Zhao +6 more
TL;DR: This paper presents the first generic construction of a chosen-ciphertext (CCA) secure uni-directional proxy re-encryption (PRE) scheme and establishes a totally novel methodology for designing PRE based on a specific class of threshold encryption.
Journal ArticleDOI
Fine-grained access control system based on fully outsourced attribute-based encryption
Rui Zhang,Hui Ma,Yao Lu +2 more
TL;DR: This work proposes a fully outsourced ciphertext-policy ABE scheme that for the first time achieves outsourced key generation, encryption and decryption simultaneously and the experimental results indicate that the scheme is efficient and practical.
Journal ArticleDOI
Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications
TL;DR: The theoretic comparisons and the experimental results show that the proposed MFAKE protocol achieves both security and usability, and the existing multi-factor protocols did not provide enough security and efficiency simultaneously.